WO2013115691A1 - Method and arrangement in a telecommunication system - Google Patents

Method and arrangement in a telecommunication system Download PDF

Info

Publication number
WO2013115691A1
WO2013115691A1 PCT/SE2012/050610 SE2012050610W WO2013115691A1 WO 2013115691 A1 WO2013115691 A1 WO 2013115691A1 SE 2012050610 W SE2012050610 W SE 2012050610W WO 2013115691 A1 WO2013115691 A1 WO 2013115691A1
Authority
WO
WIPO (PCT)
Prior art keywords
random access
value
cell
values
range
Prior art date
Application number
PCT/SE2012/050610
Other languages
French (fr)
Inventor
Mikael WITTBERG
Mattias BERGSTRÖM
Original Assignee
Telefonaktiebolaget L M Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget L M Ericsson (Publ) filed Critical Telefonaktiebolaget L M Ericsson (Publ)
Priority to EP12730054.9A priority Critical patent/EP2810488B1/en
Priority to US13/635,557 priority patent/US9681439B2/en
Publication of WO2013115691A1 publication Critical patent/WO2013115691A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/14Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/002Transmission of channel access control information
    • H04W74/006Transmission of channel access control information in the downlink, i.e. towards the terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access, e.g. scheduled or random access
    • H04W74/08Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
    • H04W74/0833Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support

Definitions

  • the present invention relates to avoiding preamble collisions when performing random access on a secondary cell.
  • LTE Long Term Evolution
  • OFDM orthogonal frequency division multiplexing
  • DFT discrete Fourier Transform
  • resource allocation in LTE is typically described in terms of resource blocks (RB), where a resource block corresponds to one slot (0.5 ms) in the time domain and 12 contiguous subcarriers in the frequency domain.
  • RB resource blocks
  • a pair of two adjacent resource blocks in time direction (1.0 ms) is known as a resource block pair.
  • Resource blocks are numbered in the frequency domain, starting with 0 from one end of the system bandwidth.
  • VRB virtual resource blocks
  • PRB physical resource blocks
  • the notion of virtual resource blocks (VRB) and physical resource blocks (PRB) has been introduced in LTE.
  • the actual resource allocation to a user equipment (UE) is made in terms of VRB pairs.
  • a VRB pair is directly mapped to a PRB pair, hence two consecutive and localized VRB are also placed as consecutive PRBs in the frequency domain.
  • the distributed VRBs are not mapped to consecutive PRBs in the frequency domain; thereby providing frequency diversity for data channel transmitted using these distributed VRBs.
  • Downlink transmissions are dynamically scheduled, i.e., in each subframe the base station transmits control information about which UEs data is transmitted and upon which resource blocks the data is transmitted, in the current downlink subframe.
  • CFI Control Format Indicator
  • the downlink subframe also contains common reference symbols (CRS), which are known to the receiver and used for coherent demodulation of, e.g., the control information.
  • CRS Common reference symbols
  • the LTE Rel-10 specifications have recently been standardized, supporting Component Carrier (CC) bandwidths up to 20 MHz (which is the maximal LTE Rel- 8 carrier bandwidth). Hence, an LTE Rel-10 operation wider than 20 MHz is possible and appears as a number of LTE carriers to an LTE Rel-10 UE.
  • CC Component Carrier
  • CA Carrier Aggregation
  • the Rel-10 standard supports up to 5 aggregated carriers where each carrier is limited in the radio frequency (RF) specifications to have a one of six bandwidths namely 6, 15, 25, 50, 75 or 100 RBs (corresponding to 1.4, 3, 5, 10, 15, and 20 MHz respectively).
  • RF radio frequency
  • the number of aggregated CCs as well as the bandwidth of the individual CC may be different for uplink and downlink.
  • a symmetric configuration refers to the case where the number of CCs in downlink and uplink is the same whereas an asymmetric configuration refers to the case that the number of CCs is different. It is important to note that the number of CCs configured in the network may be different from the number of CCs seen by a UE.
  • a UE may, for example, support more downlink CCs than uplink CCs, even though the network offers the same number of uplink and downlink CCs.
  • a LTE Rel-10 UE behaves similarly to a LTE Rel-8 UE.
  • a UE may, depending on its own capabilities and the network, be configured with additional CCs in the UL and DL. Configuration is based on radio resource control (RRC). Due to the heavy signaling, and the rather slow speed of RRC signaling, it is envisioned that a UE may be configured with multiple CCs even though not all of them are currently used. If a UE is activated on multiple CCs this would imply it has to monitor all downlink (DL) CCs for physical downlink control channel (PDCCH) and physical downlink shared channel (PDSCH). This implies a wider receiver bandwidth, higher sampling rates, etc., resulting in high power consumption.
  • DL downlink
  • PDSCH physical downlink shared channel
  • PCell Primary Cell
  • the uplink (UL) PCell is configured with Physical Uplink Control Channel (PUCCH) and used for transmission of Layer 1 (L1) uplink control information. This also includes (Channel State Information) CSI for the DL transmission on the activated SCells.
  • PUCCH Physical Uplink Control Channel
  • L1 Layer 1
  • This also includes (Channel State Information) CSI for the DL transmission on the activated SCells.
  • the base station may configure the user equipment with additional serving cells, so called “Secondary Cells” (SCells) as extra resources when needed.
  • SCells Secondary Cells
  • the user equipment may be configured with one or more, up to four SCells.
  • a UE may need to contact the network (via the eNodeB) without having a dedicated resource in the Uplink (from UE to base station).
  • a random access procedure is available where a UE that does not have a dedicated UL resource may transmit a signal to the base station.
  • the first message of this procedure is typically transmitted on a special resource reserved for random access, a physical random access channel (PRACH).
  • PRACH physical random access channel
  • This channel can for instance be limited in time and/or frequency (as in LTE).
  • Figure 5 illustrates random access preamble transmission 14 including uplink resources used for data transmission 16 and uplink resources reserved for random access preamble transmission 18.
  • the resources available for PRACH transmission are provided to the UEs as part of the broadcasted system information (or as part of dedicated RRC signaling in case of, e.g., handover).
  • the random access procedure can be used for a number of different reasons including: Initial access (for UEs in the LTEJDLE or LTE_DETACHED states)
  • the contention-based random access procedure 20 used between a UE 22 and an LTE RAN 24 in LTE is illustrated in Figure 6.
  • the UE 22 receives system information for random access 26 from the LTE RAN 24.
  • the UE 22 starts the random access procedure by randomly selecting one of the preambles available for contention-based random access as shown in block 27.
  • the UE 22 then transmits the selected random access preamble on the PRACH to an eNode B in the LTE RAN 24 in step 28.
  • the RAN acknowledges any preamble it detects by transmitting a random access response (MSG2) 30 including an initial grant to be used on the uplink shared channel, a temporary cell-radio network temporary identifier (C-RNTI), and a time alignment (TA) update based on the timing offset of the preamble measured by the eNodeB on the PRACH.
  • MSG2 30 is transmitted in the DL to the UE 22 and its corresponding PDCCH message CRC is scrambled with the RA-RNTI.
  • the UE 22 uses the grant to transmit a message (MSG3) 32 that in part is used to trigger the establishment of radio resource control and in part to uniquely identify the UE 22 on the common channels of the cell.
  • MSG3 message
  • the timing alignment command provided in the random access response is applied in the UL transmission in MSG3 32.
  • the eNB can change the resources blocks that are assigned for a MSG3 32 transmission by sending an UL grant the CRC of which can be scrambled with the temporary cell-radio network temporary identifier (TC-RNTI).
  • TC-RNTI temporary cell-radio network temporary identifier
  • the MSG4 34 which is then contention resolution has its PDCCH CRC scrambled with the C-RNTI if the UE previously has a C-RNTI assigned. If the UE does not have a C-RNTI previously assigned its PDCCH CRC is scrambled with the TC-RNTI.
  • the procedure ends with the LTE RAN 24 solving any preamble contention that may have occurred for the case where multiple UEs transmitted the same preamble at the same time. This can occur since each UE randomly selects when to transmit and which preamble to use. If multiple UEs select the same preamble for the transmission on the RACH, there will be contention between these UEs that needs to be resolved through the contention resolution message (MSG4) 34.
  • MSG4 contention resolution message
  • the case when contention occurs is illustrated in Figure 7, where two UEs, UE1 22 and UE2 36, transmit the same preamble, Ps 38, at the same time.
  • a third UE, UE3 40 also transmits at the same RACH, but since it transmits with a different preamble, i 42, there is no contention between UE3 40 and the other two UEs (UE1 22 and UE2 36).
  • the UE 22 can also perform non-contention based random access.
  • a non- contention based random access or contention free random access can, e.g., be initiated by the eNB to get the UE 22 to achieve synchronisation in UL.
  • the eNB initiates a non-contention based random access either by sending a PDCCH order or indicating it in an RRC message. The latter of the two is used in case of handover (HO).
  • the eNB can also order the UE 22 through a PDCCH message to perform a contention based random access, the procedure for this is illustrated in Figure 7.
  • the procedure for the UE 22 to perform contention free random access is illustrated as shown in Figure 8.
  • the UE 22 receives system information for random access 44 and a random access order 46 from the LTE RAN 24.
  • the UE 22 then transmits a random access preamble to the LTE RAN 24. Similar to the contention based random access the MSG2 30 is transmitted in the DL to the UE 22 and its corresponding PDCCH message CRC is scrambled with the RA-RNTI.
  • the UE 22 considers the contention resolution successfully completed after it has received MSG2 50 successfully.
  • the MSG2 50 contains a timing alignment value. This enables the eNB to set the initial/updated timing according to the UEs transmitted preamble.
  • the random access procedure is limited to the primary cell only. This implies that the UE 22 can only send a preamble on the primary cell. Further MSG2 30 and MSG3 32 is only received and transmitted on the primary cell. MSG4 34 can however in Rel-10 be transmitted on any DL cell.
  • a first cell e.g., their PCell
  • UEs performing random access on a second cell e.g., one of their SCell(s)
  • a method for handling random access in a radio communication system comprising: transmitting, by a network node, a random access response including a Radio Network Temporary Identifier (RNTI) which has a first value if the random access is associated with a first cell or a second value if the random access is associated with a second cell, wherein the first value is different than the second value and the first cell is different from the second cell.
  • RNTI Radio Network Temporary Identifier
  • the above-described network node method can be implemented in a network node having a transceiver which is configured to perform the method.
  • a network node capable of handling random access in a radio communication system
  • a processor configured to generate a random access response including a Radio Network Temporary Identifier (RNTI) which has a first value if the random access is associated with a first cell or a second value if the random access is associated with a second cell, wherein the first value is different than the second value and the first cell is different from the second cell; and a transceiver configured to transmit the random access response.
  • RNTI Radio Network Temporary Identifier
  • a radio communication system comprising:
  • a transceiver in a user equipment UE
  • a random access response including a Radio Network Temporary Identifier (RNTI) which has a first value if the random access is associated with a first cell or a second value if the random access is associated with a second cell, wherein the first value is different than the second value and the first cell is different from the second cell.
  • RNTI Radio Network Temporary Identifier
  • the above-described UE method can be implemented in a UE having a transceiver which is configured to perform the method.
  • a user equipment capable of performing random access in a radio communication system comprising: a transceiver configured to receive a random access response including a Radio Network Temporary Identifier (RNTI) which has a first value if the random access is associated with a first cell or a second value if the random access is associated with a second cell, wherein the first value is different than the second value and the first cell is different from the second cell.
  • RNTI Radio Network Temporary Identifier
  • FIG. 1 depicts a Long Term Evolution (LTE) downlink physical resource
  • Figure 2 shows an LTE time-domain structure
  • Figure 3 illustrates a downlink subframe
  • Figure 4 shows an example of Carrier Aggregation
  • Figure 5 is an illustration of a random access preamble transmission
  • Figure 6 shows signalling over an air interface for a contention based random access procedure in LTE
  • Figure 7 depicts contention between two UEs
  • Figure 8 illustrates signalling over the air interface for contention-free random access procedure in LTE
  • Figure 9 shows a release-10 UE and a release-11 UE
  • Figure 10 shows a signalling diagram for when an exemplary embodiment can be applied
  • FIG 11 illustrates how MSG2 is scheduled conventionally
  • Figure 12 shows how MSG2 is scheduled according to an exemplary embodiment
  • Figure 13 shows a UE or a network node according to exemplary embodiments
  • Figure 14 shows a method flowchart according to an exemplary embodiment
  • Figure 15 shows a method flowchart according to an exemplary embodiment.
  • Embodiments of the present invention are described within the context of Evolved-Universal Mobile Telecommunications System Terrestrial Radio Access Network (E-UTRAN), also referred to as Long Term Evolution (LTE).
  • E-UTRAN Evolved-Universal Mobile Telecommunications System Terrestrial Radio Access Network
  • LTE Long Term Evolution
  • UEs user-equipments
  • LTE is used as an example technology where the invention is suitable, and using LTE in the description therefore is particularly useful for understanding the problem and solutions solving the problem and the use of LTE terminology should not be seen as limiting to this particular technology.
  • LTE Rel-11 specification allows random access to be ordered by the eNB both on the primary cell (PCell) and on a secondary cell (SCell). The details of how the random access response message is to be handled in Rel-11 for an SCell have not yet been agreed upon, but one solution that is discussed is to extend the existing random access procedure used on a PCell with the following changes:
  • PDCCH physical downlink control channel
  • PDSCH physical downlink shared channel
  • this solution means that the MSG2 is always scheduled and sent on the PCell, even in case the random access preamble message was sent on an SCell.
  • the MSG2 message is scheduled and sent on another cell than the cell on which the random access is performed and where the random access preamble message is sent.
  • This handling of MSG2 for an SCell has the problem that the preamble number sent on the SCell must also be unique in the PCell, since the random access response message is sent on the PCell. For example, if two UEs, UE1 22 and UE2 36, were to be configured with the same cells as PCell and UE1 22 performs a random access procedure on its PCell while UE2 36 performs a random access procedure on one of its SCells, then UE1 22 and UE2 36 cannot use the same preamble since they both will receive their MSG2 30 on their PCell. This is different from the normal case when the preamble only needs to be unique within one cell, because both the preamble and the MSG2 30 message are sent on the same cell. This problem means that the eNB must coordinate preamble numbers between different cells, and not just within the same cell, and which makes it more difficult to use the maximum number of preambles efficiently in the system.
  • C-RNTI cell-radio network temporary identifier
  • 3GPP 3 rd Generation Partnership Project
  • FIG. 9 An example of this is shown Figure 9 where a Rel-10 UE (UE1 22) is configured to use Cell X 52 as its PCell and Cell Z 54 as an SCell and a Rel-11 UE (UE2 36) is configured to use Cell X 52 as its PCell and Cell Y 56 as an SCell. It is assumed that MSG2 will be sent on the PCell also for a random access procedure performed on an SCell and hence the MSG2 for any random access procedure performed by UE2 36 will be sent by the eNB on Cell X 52.
  • UE1 22 and UE2 36 cannot use the same preamble at the same time for a random access procedure even if UE1 22 performs the random access procedure on Cell X 52 and UE2 36 performs random access procedure on Cell Y 56.
  • the problem that arises from this example is that the UE performing random access on an SCell is sending the MSG2 message on the same cell as the legacy UE is performing its random access on, and since the preamble is included in the random access response in MSG2, it is not possible to distinguish between these two UEs based only on the preamble, if both UEs are using the same preamble number. Therefore it is still necessary to coordinate the preambles between legacy UEs performing random access on their PCell, and Rel-11 UEs performing random access on an SCell using the same cell as the legacy UE as their PCell.
  • an exemplary method can, for example, distinguish between random access response messages scheduled on PDCCH intended for a UE performing random access on a first cell, e.g., the UE's PCell, and UEs performing random access on a second cell (which is different from the first cell), e.g., one of their SCell(s).
  • the method will use different RA-RNTI values when scheduling the random access response messages for the two cases:
  • Random access response message for UEs performing random access on their PCell Random access response message for UEs performing random access on one of their SCells.
  • UEs that are performing random access on their PCell will only receive (i.e., in the sense of reading or decoding) those random access response messages that have been scheduled with an RA-RNTI intended for a PCell, in the first group above; and UEs that are performing random access on one of their SCell will only receive (i.e., in the sense of reading or decoding) those random access response messages intended for an SCell, in the second group above.
  • UEs in one group will not receive (i.e., in the sense of reading or decoding) the random access response messages in the other group.
  • Exemplary systems and methods which perform random access can be performed in various environments, e.g., contention free or contention based random access.
  • Figure 10 is a signaling diagram showing when the method described in these embodiments can be applied.
  • UE1 22 and UE2 36 are performing random access on different cells while using the same cell as their PCell, i.e., Cell X 52, and are using the same preamble (N). This can be seen in messages 58 and 60.
  • UE1 22 transmits message 62 on Cell X 52 including the random access preamble N
  • UE2 36 transmits message 64 on Cell Y 54 including the random access preamble N.
  • the UEs When the MSG2 66 is received by the UEs on the same cell, the UEs cannot know which of the two random access responses they should act on, if two random access responses will be included in the MSG2 66 with the same preamble number. If one random access response is included in the MSG2 66 in this example both UEs will act on the one random access response which will be incorrect for one of the UEs. Alternatively, for another example, an eNB in the LTE RAN 24 can send only one random access response for which both UEs 22 and 36 would act on the random access response.
  • Figure 11 shows in more detail how the MSG2 66 is both scheduled and sent to the UEs which were depicted in Figure 10.
  • the diagram shows an example which uses the current, conventional method of how to calculate the RA-RNTI when scheduling MSG2 on PDCCH.
  • MSG2 is scheduled, by the LTE RAN 24, on PDCCH on Cell X 52 for both UEs as shown in step 68.
  • the MSG2 is then sent, by the LTE RAN 24, on PDSCH on Cell X 52 with the preamble N to both UE1 22 and UE2 36 as shown by message 70.
  • the RA-RNTI values for both UEs will be the same in this case.
  • the t id and the fjd where tjd is the index of the first subframe of the specified PRACH and fjd is the index of the specified PRACH within that subframe for both UE1 22 and UE2 36 are the same and therefore the RA-RNTI values for both UEs will be the same.
  • the RA-RNTI values are calculated using conventional methods as described in chapter 5.1.4 of 3GPP TS 36.321 , e.g., equation (1) which is described in more detail later in the specification.
  • a purpose of the proposed method is to distinguish between UEs performing random access on a PCell and UEs performing random access on one of their SCell(s), by using different encodings of the RA-RNTI value.
  • the RA-RNTI value is used when scheduling the random access response message (MSG2).
  • MSG2 random access response message
  • the calculation of the RA-RNTI value will be extended from the current method as shown below in equation (1):
  • RNTI 1 + 1 id + 10*f_id (1)
  • RNTI 1 + tjd + 10*f_id + (60*is_SCell) (2)
  • t id is the index of the first subframe of the specified PRACH (0 ⁇ t_id ⁇ 10)
  • fjd is the index of the specified PRACH within that subframe, in ascending order of frequency domain (0 ⁇ f_id ⁇ 6) and is_SCell is equal to 0 when performing RA on a PCell and equal to 1 when performing RA on an SCell.
  • the RA-RNTI value could be calculated as shown below in equation (3):
  • RNTI 1 + t_id + 10 * f_id + (60*is_PCell) (3)
  • tjd is the index of the first subframe of the specified PRACH (0 ⁇ t_id ⁇ 10)
  • f_id is the index of the specified PRACH within that subframe, in ascending order of frequency domain (0 ⁇ fjd ⁇ 6)
  • is_PCell is equal to 1 when performing RA on a PCell and equal to 0 when performing RA on an SCell.
  • the same general method is used as in the embodiment above, but the calculation of the RA-RNTI when performing random access on an SCell is done in any other way that makes the value different from a value used when performing random access on a PCell. That is, any method that produces an RA-RNTI value for an SCell access which is non-overlapping with the range used for a PCell access, e.g., 1 .. 60, is considered in this embodiment.
  • these "new" RA-RNTI values can be an extension of currently RA-RNTI values. This can be done by extending the RA-RNTI size by a bit, with the extra bit having a flag which indicates if the RA was performed on a PCell or an SCell.
  • Figure 12 illustrates in more detail how the MSG2 is both scheduled and sent to the UEs, allowing for successful random access for both UEs, which were depicted in Figure 10 according to an embodiment.
  • the diagram shows the method of how to calculate the RA-RNTI described in the first embodiment used when scheduling MSG2 on PDCCH. While Figure 12 appears similar to Figure 11 , there are differences in how the RA-RNTI is determined which allows for the successful random access for both UEs.
  • MSG2 is scheduled, by the LTE RAN 24, on PDCCH on Cell X 52 for both UEs as shown in step 72.
  • the MSG2 is then sent, by the LTE RAN 24, on PDSCH on Cell X 52 with the preamble N to both UE1 22 and UE2 36 as shown by message 74.
  • the RA-RNTI values for both UEs will be different in this case. More specifically, in this example which uses equation (2) described above, the t id and the fjd for both UE1 22 and UE2 36 are the same but the is_SCell parameter is different with UE1 22 setting the parameter to 0 and UE2 36 setting the parameter to 1. Thus the RA-RNTI values for both UEs will be different.
  • the method steps performed by the UE can be performed by functional elements of the processing circuitry. In some embodiments these functions are carried out by appropriately programmed microprocessors or microcontrollers, alone or in conjunction with other digital hardware, which may include digital signal processors (DSPs), special-purpose digital logic, and the like. Either or both of the microprocessors and digital hardware (generally illustrated as a "processor” 78 in Figure 13) may be configured to execute program code stored in memory. Since the various details and engineering tradeoffs associated with the design of baseband processing circuitry for mobile devices and wireless base stations are well known and are unnecessary to a full understanding of the invention, additional details are not shown here.
  • the UE 76 will also typically include a transceiver 80, as seen in Figure 13, for transmitting and receiving signals, e.g., random access responses including RNTIs whose values may vary as described above.
  • Figure 13 also depicts the functional elements as related to embodiments described herein for a network node 82, e.g., an E-NodeB or another network node in an LTE system, can include a processor 78 and, potentially, a transceiver 80 and memory circuit (not shown).
  • a network node 82 e.g., an E-NodeB or another network node in an LTE system
  • a method for handling random access in a radio communication system is shown in the flowchart of Figure 14.
  • the method includes: at step 84, transmitting, by a network node, a random access response including a Radio Network Temporary Identifier (RNTI) which has a first value if the random access is associated with a first cell or a second value if the random access is associated with a second cell, wherein the first value is different than the second value and the first cell is different from the second cell.
  • RNTI Radio Network Temporary Identifier
  • the method includes: at step 86, receiving, by a transceiver in a user equipment (UE), a random access response including a Radio Network Temporary Identifier (RNTI) which has a first value if the random access is associated with a first cell or a second value if the random access is associated with a second cell, wherein the first value is different than the second value and the first cell is different from the second cell.
  • UE user equipment
  • RNTI Radio Network Temporary Identifier
  • a method for random access in a radio communication system comprising: transmitting, by a network node, a random access response including a Radio Network Temporary Identifier (RNTI) which has a first value if the random access is associated with a primary cell (PCell) and a second value if the random access is associated with a secondary cell (SCell), the first value being different than the second value.
  • RNTI Radio Network Temporary Identifier
  • the first or second value can be generated by the network node in any desired manner, e.g., using one of the equations described below in the detailed description.
  • a method for random access in a radio communication system comprises: receiving, by a user equipment (UE), a random access response including a Radio Network Temporary Identifier (RNTI) which has a first value if the random access is associated with a primary cell (PCell) and a second value if the random access is associated with a secondary cell (SCell), the first value being different than the second value.
  • UE user equipment
  • RNTI Radio Network Temporary Identifier
  • the above-described UE method can be implemented in a UE having a transceiver which is configured to perform the method.
  • Program code stored in the memory circuit may comprise one or several types of memory such as read-only memory (ROM), random-access memory, cache memory, flash memory devices, optical storage devices, etc., and includes program instructions for executing one or more telecommunications and/or data communications protocols, as well as instructions for carrying out one or more of the techniques described herein, in several embodiments.
  • ROM read-only memory
  • RAM random-access memory
  • cache memory cache memory
  • flash memory devices optical storage devices
  • Program code stored in the memory circuit may comprise one or several types of memory such as read-only memory (ROM), random-access memory, cache memory, flash memory devices, optical storage devices, etc.
  • program instructions for executing one or more telecommunications and/or data communications protocols as well as instructions for carrying out one or more of the techniques described herein, in several embodiments.

Abstract

Systems and methods avoid the need to coordinate preambles between UEs performing random access on their PCells and SCells. According to an embodiment, a method for random access in a radio communication system includes: transmitting, by a network node, a random access response including a Radio Network Temporary Identifier (RNTI) which has a first value if the random access is associated with a first cell and a second value if the random access is associated with a second cell, the first value being different than the second value and the first cell being different from the second cell.

Description

Method and Arrangement in a Telecommunication System
TECHNICAL FIELD
The present invention relates to avoiding preamble collisions when performing random access on a secondary cell.
BACKGROUND
Long Term Evolution (LTE) uses orthogonal frequency division multiplexing (OFDM) in the downlink and discrete Fourier Transform (DFT)-spread OFDM in the uplink. The basic LTE downlink physical resource can thus be seen as a time- frequency grid 2 as illustrated in Figure 1, where each resource element 4 corresponds to one OFDM subcarrier during one OFDM symbol interval.
In the time domain, LTE downlink transmissions, as shown in Figure 2, are organized into radio frames of 10 ms, each radio frame 6 consisting of ten equally- sized subframes of length TSUbframe = 1 ms.
Furthermore, the resource allocation in LTE is typically described in terms of resource blocks (RB), where a resource block corresponds to one slot (0.5 ms) in the time domain and 12 contiguous subcarriers in the frequency domain. A pair of two adjacent resource blocks in time direction (1.0 ms) is known as a resource block pair. Resource blocks are numbered in the frequency domain, starting with 0 from one end of the system bandwidth.
The notion of virtual resource blocks (VRB) and physical resource blocks (PRB) has been introduced in LTE. The actual resource allocation to a user equipment (UE) is made in terms of VRB pairs. There are two types of resource allocations, localized and distributed. In the localized resource allocation, a VRB pair is directly mapped to a PRB pair, hence two consecutive and localized VRB are also placed as consecutive PRBs in the frequency domain. On the other hand, the distributed VRBs are not mapped to consecutive PRBs in the frequency domain; thereby providing frequency diversity for data channel transmitted using these distributed VRBs.
Downlink transmissions are dynamically scheduled, i.e., in each subframe the base station transmits control information about which UEs data is transmitted and upon which resource blocks the data is transmitted, in the current downlink subframe. This control signaling is typically transmitted in the first 1, 2, 3 or 4 OFDM symbols in each subframe and the number n=1, 2, 3 or 4 is known as the Control Format Indicator (CFI). The downlink subframe also contains common reference symbols (CRS), which are known to the receiver and used for coherent demodulation of, e.g., the control information. A downlink system 8 with CFI=3 OFDM symbols for control signaling is illustrated in Figure 3.
Carrier Aggregation
The LTE Rel-10 specifications have recently been standardized, supporting Component Carrier (CC) bandwidths up to 20 MHz (which is the maximal LTE Rel- 8 carrier bandwidth). Hence, an LTE Rel-10 operation wider than 20 MHz is possible and appears as a number of LTE carriers to an LTE Rel-10 UE.
In particular for early LTE Rel-10 deployments it can be expected that there will be a smaller number of LTE Rel-10 capable UEs compared to many LTE legacy UEs. Therefore, it is necessary to assure an efficient use of a wide carrier also for legacy UEs, i.e., that it is possible to implement carriers where legacy UEs can be scheduled in all parts of the wideband LTE Rel-10 carrier. The straightforward way to obtain this would be by means of Carrier Aggregation (CA). CA implies that an LTE Rel-10 UE can receive multiple CC, where the CC have, or at least the possibility to have, the same structure as a Rel-8 carrier. CA is illustrated in Figure 4 which shows five 20 MHz bandwidths 10 and the aggregated bandwidth 12 of 100 MHz.
The Rel-10 standard supports up to 5 aggregated carriers where each carrier is limited in the radio frequency (RF) specifications to have a one of six bandwidths namely 6, 15, 25, 50, 75 or 100 RBs (corresponding to 1.4, 3, 5, 10, 15, and 20 MHz respectively).
The number of aggregated CCs as well as the bandwidth of the individual CC may be different for uplink and downlink. A symmetric configuration refers to the case where the number of CCs in downlink and uplink is the same whereas an asymmetric configuration refers to the case that the number of CCs is different. It is important to note that the number of CCs configured in the network may be different from the number of CCs seen by a UE. A UE may, for example, support more downlink CCs than uplink CCs, even though the network offers the same number of uplink and downlink CCs.
During initial access a LTE Rel-10 UE behaves similarly to a LTE Rel-8 UE. Upon successful connection to the network a UE may, depending on its own capabilities and the network, be configured with additional CCs in the UL and DL. Configuration is based on radio resource control (RRC). Due to the heavy signaling, and the rather slow speed of RRC signaling, it is envisioned that a UE may be configured with multiple CCs even though not all of them are currently used. If a UE is activated on multiple CCs this would imply it has to monitor all downlink (DL) CCs for physical downlink control channel (PDCCH) and physical downlink shared channel (PDSCH). This implies a wider receiver bandwidth, higher sampling rates, etc., resulting in high power consumption.
Component Carrier Types Initially, the user equipment will be configured with one UUDL pair of component carriers, on which it made the initial random access. These component carriers are together called the Primary Cell (PCell).
The uplink (UL) PCell is configured with Physical Uplink Control Channel (PUCCH) and used for transmission of Layer 1 (L1) uplink control information. This also includes (Channel State Information) CSI for the DL transmission on the activated SCells.
In addition to the PCell, the base station may configure the user equipment with additional serving cells, so called "Secondary Cells" (SCells) as extra resources when needed. The user equipment may be configured with one or more, up to four SCells.
Random Access
In LTE, as in any communication system, a UE may need to contact the network (via the eNodeB) without having a dedicated resource in the Uplink (from UE to base station). To handle this, a random access procedure is available where a UE that does not have a dedicated UL resource may transmit a signal to the base station. The first message of this procedure is typically transmitted on a special resource reserved for random access, a physical random access channel (PRACH). This channel can for instance be limited in time and/or frequency (as in LTE). Figure 5 illustrates random access preamble transmission 14 including uplink resources used for data transmission 16 and uplink resources reserved for random access preamble transmission 18. The resources available for PRACH transmission are provided to the UEs as part of the broadcasted system information (or as part of dedicated RRC signaling in case of, e.g., handover).
In LTE, the random access procedure can be used for a number of different reasons including: Initial access (for UEs in the LTEJDLE or LTE_DETACHED states)
• Incoming handover
• Resynchronization of the UL
• Scheduling request (for a UE that is not allocated any other resource for contacting the base station)
• Positioning
The contention-based random access procedure 20 used between a UE 22 and an LTE RAN 24 in LTE is illustrated in Figure 6. Initially, the UE 22 receives system information for random access 26 from the LTE RAN 24. The UE 22 starts the random access procedure by randomly selecting one of the preambles available for contention-based random access as shown in block 27. The UE 22 then transmits the selected random access preamble on the PRACH to an eNode B in the LTE RAN 24 in step 28.
The RAN acknowledges any preamble it detects by transmitting a random access response (MSG2) 30 including an initial grant to be used on the uplink shared channel, a temporary cell-radio network temporary identifier (C-RNTI), and a time alignment (TA) update based on the timing offset of the preamble measured by the eNodeB on the PRACH. The MSG2 30 is transmitted in the DL to the UE 22 and its corresponding PDCCH message CRC is scrambled with the RA-RNTI.
When receiving the response the UE 22 uses the grant to transmit a message (MSG3) 32 that in part is used to trigger the establishment of radio resource control and in part to uniquely identify the UE 22 on the common channels of the cell. The timing alignment command provided in the random access response is applied in the UL transmission in MSG3 32. The eNB can change the resources blocks that are assigned for a MSG3 32 transmission by sending an UL grant the CRC of which can be scrambled with the temporary cell-radio network temporary identifier (TC-RNTI).
The MSG4 34 which is then contention resolution has its PDCCH CRC scrambled with the C-RNTI if the UE previously has a C-RNTI assigned. If the UE does not have a C-RNTI previously assigned its PDCCH CRC is scrambled with the TC-RNTI.
The procedure ends with the LTE RAN 24 solving any preamble contention that may have occurred for the case where multiple UEs transmitted the same preamble at the same time. This can occur since each UE randomly selects when to transmit and which preamble to use. If multiple UEs select the same preamble for the transmission on the RACH, there will be contention between these UEs that needs to be resolved through the contention resolution message (MSG4) 34. The case when contention occurs is illustrated in Figure 7, where two UEs, UE1 22 and UE2 36, transmit the same preamble, Ps 38, at the same time. A third UE, UE3 40, also transmits at the same RACH, but since it transmits with a different preamble, i 42, there is no contention between UE3 40 and the other two UEs (UE1 22 and UE2 36).
The UE 22 can also perform non-contention based random access. A non- contention based random access or contention free random access can, e.g., be initiated by the eNB to get the UE 22 to achieve synchronisation in UL. The eNB initiates a non-contention based random access either by sending a PDCCH order or indicating it in an RRC message. The latter of the two is used in case of handover (HO).
The eNB can also order the UE 22 through a PDCCH message to perform a contention based random access, the procedure for this is illustrated in Figure 7. The procedure for the UE 22 to perform contention free random access is illustrated as shown in Figure 8. The UE 22 receives system information for random access 44 and a random access order 46 from the LTE RAN 24. The UE 22 then transmits a random access preamble to the LTE RAN 24. Similar to the contention based random access the MSG2 30 is transmitted in the DL to the UE 22 and its corresponding PDCCH message CRC is scrambled with the RA-RNTI. The UE 22 considers the contention resolution successfully completed after it has received MSG2 50 successfully.
For the contention free random access, as for the contention based random access, the MSG2 50 contains a timing alignment value. This enables the eNB to set the initial/updated timing according to the UEs transmitted preamble.
In LTE in Rel-10 the random access procedure is limited to the primary cell only. This implies that the UE 22 can only send a preamble on the primary cell. Further MSG2 30 and MSG3 32 is only received and transmitted on the primary cell. MSG4 34 can however in Rel-10 be transmitted on any DL cell.
In LTE Rel-11 , the current assumption is that the random access procedure will be supported also on secondary cells, at least for the UEs supporting Rel-11 carrier aggregation. So far only network initiated random access on SCells is assumed.
SUMMARY
It is an object of exemplary embodiments to avoid the need to coordinate preambles between UEs performing random access on a first cell, e.g., their PCell, with UEs performing random access on a second cell, e.g., one of their SCell(s), using the same PCell as the legacy UE. By using the exemplary systems and methods described herein, there can be a reduction of preamble conflicts in UEs. It will be appreciated by those skilled in the art, however, that the invention is not limited to those embodiments which produce any or all of these advantages or benefits and that other advantages and benefits may be realized depending upon the particular implementation.
According to an exemplary embodiment, there is a method for handling random access in a radio communication system comprising: transmitting, by a network node, a random access response including a Radio Network Temporary Identifier (RNTI) which has a first value if the random access is associated with a first cell or a second value if the random access is associated with a second cell, wherein the first value is different than the second value and the first cell is different from the second cell.
The above-described network node method can be implemented in a network node having a transceiver which is configured to perform the method.
According to another exemplary embodiment, there is a network node capable of handling random access in a radio communication system
comprising: a processor configured to generate a random access response including a Radio Network Temporary Identifier (RNTI) which has a first value if the random access is associated with a first cell or a second value if the random access is associated with a second cell, wherein the first value is different than the second value and the first cell is different from the second cell; and a transceiver configured to transmit the random access response.
According to another exemplary embodiment, there is a method for performing random access in a radio communication system comprising:
receiving, by a transceiver in a user equipment (UE), a random access response including a Radio Network Temporary Identifier (RNTI) which has a first value if the random access is associated with a first cell or a second value if the random access is associated with a second cell, wherein the first value is different than the second value and the first cell is different from the second cell.
The above-described UE method can be implemented in a UE having a transceiver which is configured to perform the method.
According to another exemplary embodiment, there is a user equipment (UE) capable of performing random access in a radio communication system comprising: a transceiver configured to receive a random access response including a Radio Network Temporary Identifier (RNTI) which has a first value if the random access is associated with a first cell or a second value if the random access is associated with a second cell, wherein the first value is different than the second value and the first cell is different from the second cell.
Other objects, advantages and novel features of the invention will become apparent from the following detailed description of the invention when considered in conjunction with the accompanying drawings. ABBREVIATIONS
3GPP 3rd Generation Partnership Project
AL Aggregation Layer
CA Carrier Aggregation
CC Component Carrier
CCE Control Channel Elements
CFI Control Format Indicator
CRC Cyclic Redundancy Check
C-RNTI Cell-Radio Network Temporary Identifier
DFT Discrete Fourier Transform
DL Downlink
eNB Evolve Node B
HO Handover
LTE Long Term Evolution
OFDM Orthogonal Frequency-Division Multiplexing
PCC Primary component carrier
PCell Primary cell
PDCCH Physical Downlink Control Channel
PRACH Physical Random Access Control Channel
PRB Physical Resource Block
RACH Random Access Control Channel
RA Random Access
RA-RNTI Random Access-Radio Network Temporary Identifier
RB Resource Block
RAN Radio Access Network
RF Radio Frequency
RNTI Radio Network Temporary Identifier(s)
RRC Radio Resource Control
sec Secondary component carrier SCell Secondary cell
TA Timing Advance
TC-RNTI Temporary Cell-Radio Network Temporary Identifier
UE User Equipment
UL Uplink
VRB Virtual Resource Block
A BRIEF DESCRIPTION OF THE DRAWINGS
The accompanying drawings illustrate exemplary embodiments, wherein:
Figure 1 depicts a Long Term Evolution (LTE) downlink physical resource;
Figure 2 shows an LTE time-domain structure;
Figure 3 illustrates a downlink subframe;
Figure 4 shows an example of Carrier Aggregation;
Figure 5 is an illustration of a random access preamble transmission;
Figure 6 shows signalling over an air interface for a contention based random access procedure in LTE;
Figure 7 depicts contention between two UEs;
Figure 8 illustrates signalling over the air interface for contention-free random access procedure in LTE;
Figure 9 shows a release-10 UE and a release-11 UE;
Figure 10 shows a signalling diagram for when an exemplary embodiment can be applied;
Figure 11 illustrates how MSG2 is scheduled conventionally;
Figure 12 shows how MSG2 is scheduled according to an exemplary embodiment;
Figure 13 shows a UE or a network node according to exemplary embodiments;
Figure 14 shows a method flowchart according to an exemplary embodiment; and
Figure 15 shows a method flowchart according to an exemplary embodiment. DETAILED DESCRIPTION
In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular architectures, interfaces, techniques, etc. in order to provide a thorough understanding of the invention. However, it will be apparent to those skilled in the art that the invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known devices, circuits, and methods are omitted so as not to obscure the description of the invention with unnecessary details.
Reference throughout the specification to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic described in connection with an embodiment is included in at least one embodiment of the present invention. Thus, the appearance of the phrases "in one embodiment" or "in an embodiment" in various places throughout the specification are not necessarily all referring to the same embodiment. Further, the particular features, structures or characteristics may be combined in any suitable manner in one or more embodiments.
Embodiments of the present invention are described within the context of Evolved-Universal Mobile Telecommunications System Terrestrial Radio Access Network (E-UTRAN), also referred to as Long Term Evolution (LTE). It should be understood that the problems and solutions described herein are equally applicable to wireless access networks and user-equipments (UEs) implementing other access technologies and standards. LTE is used as an example technology where the invention is suitable, and using LTE in the description therefore is particularly useful for understanding the problem and solutions solving the problem and the use of LTE terminology should not be seen as limiting to this particular technology. Currently the LTE Rel-11 specification allows random access to be ordered by the eNB both on the primary cell (PCell) and on a secondary cell (SCell). The details of how the random access response message is to be handled in Rel-11 for an SCell have not yet been agreed upon, but one solution that is discussed is to extend the existing random access procedure used on a PCell with the following changes:
• The random access response message (MSG2) is scheduled on
physical downlink control channel (PDCCH) on the PCell.
• The random access response message (MSG2) is sent on the
physical downlink shared channel (PDSCH) on the PCell.
Note that this solution means that the MSG2 is always scheduled and sent on the PCell, even in case the random access preamble message was sent on an SCell. Hence, when performing random access on an SCell the MSG2 message is scheduled and sent on another cell than the cell on which the random access is performed and where the random access preamble message is sent.
This handling of MSG2 for an SCell has the problem that the preamble number sent on the SCell must also be unique in the PCell, since the random access response message is sent on the PCell. For example, if two UEs, UE1 22 and UE2 36, were to be configured with the same cells as PCell and UE1 22 performs a random access procedure on its PCell while UE2 36 performs a random access procedure on one of its SCells, then UE1 22 and UE2 36 cannot use the same preamble since they both will receive their MSG2 30 on their PCell. This is different from the normal case when the preamble only needs to be unique within one cell, because both the preamble and the MSG2 30 message are sent on the same cell. This problem means that the eNB must coordinate preamble numbers between different cells, and not just within the same cell, and which makes it more difficult to use the maximum number of preambles efficiently in the system.
One solution is to include the cell-radio network temporary identifier (C- RNTI) of the UE in the random access response message sent in MSG2. This C- RNTI is proposed to be included in a temporary C-RNTI field which is currently unused in random access response message when performing contention free random access (the temporary C-RNTI field is currently only used when performing contention based random access). By including the C-RNTI in the random access response message, the UE can verify whether the random access response message is intended for itself or not. Hence, this solution will make it possible to avoid the preamble coordination between cells. Note that this solution is currently discussed in 3rd Generation Partnership Project (3GPP), but no agreement has yet been done on whether to adopt it or not.
Even if the above solution is adopted by 3GPP, it will still leave a problem with preamble coordination due to legacy UEs (based on Rel-10 or earlier) which will not check that the included C-RNTI is their own C-RNTI. Instead the legacy UEs will only check that the preamble number is correct. Hence, the previously discussed solution will not solve the problem of distinguishing between legacy UEs performing random access on their PCell, and Rel-11 UEs performing random access on one of their SCells and operating if their PCell is the same cell as the cell where the legacy UE is performing a random access.
An example of this is shown Figure 9 where a Rel-10 UE (UE1 22) is configured to use Cell X 52 as its PCell and Cell Z 54 as an SCell and a Rel-11 UE (UE2 36) is configured to use Cell X 52 as its PCell and Cell Y 56 as an SCell. It is assumed that MSG2 will be sent on the PCell also for a random access procedure performed on an SCell and hence the MSG2 for any random access procedure performed by UE2 36 will be sent by the eNB on Cell X 52. If this is the case UE1 22 and UE2 36 cannot use the same preamble at the same time for a random access procedure even if UE1 22 performs the random access procedure on Cell X 52 and UE2 36 performs random access procedure on Cell Y 56.
The problem that arises from this example is that the UE performing random access on an SCell is sending the MSG2 message on the same cell as the legacy UE is performing its random access on, and since the preamble is included in the random access response in MSG2, it is not possible to distinguish between these two UEs based only on the preamble, if both UEs are using the same preamble number. Therefore it is still necessary to coordinate the preambles between legacy UEs performing random access on their PCell, and Rel-11 UEs performing random access on an SCell using the same cell as the legacy UE as their PCell.
Accordingly, an exemplary method can, for example, distinguish between random access response messages scheduled on PDCCH intended for a UE performing random access on a first cell, e.g., the UE's PCell, and UEs performing random access on a second cell (which is different from the first cell), e.g., one of their SCell(s). To achieve this, the method will use different RA-RNTI values when scheduling the random access response messages for the two cases:
Random access response message for UEs performing random access on their PCell. Random access response message for UEs performing random access on one of their SCells.
This means that UEs that are performing random access on their PCell will only receive (i.e., in the sense of reading or decoding) those random access response messages that have been scheduled with an RA-RNTI intended for a PCell, in the first group above; and UEs that are performing random access on one of their SCell will only receive (i.e., in the sense of reading or decoding) those random access response messages intended for an SCell, in the second group above. Hence, there will be no collision between preambles between these two groups, since UEs in one group will not receive (i.e., in the sense of reading or decoding) the random access response messages in the other group. Exemplary systems and methods which perform random access can be performed in various environments, e.g., contention free or contention based random access.
To provide more context for a discussion of the embodiments, Figures 10 and 11 will be discussed which illustrate the previously described contention problem in more detail. Figure 10 is a signaling diagram showing when the method described in these embodiments can be applied. Therein, UE1 22 and UE2 36 are performing random access on different cells while using the same cell as their PCell, i.e., Cell X 52, and are using the same preamble (N). This can be seen in messages 58 and 60. After receiving messages 58 and 60, UE1 22 transmits message 62 on Cell X 52 including the random access preamble N and UE2 36 transmits message 64 on Cell Y 54 including the random access preamble N. When the MSG2 66 is received by the UEs on the same cell, the UEs cannot know which of the two random access responses they should act on, if two random access responses will be included in the MSG2 66 with the same preamble number. If one random access response is included in the MSG2 66 in this example both UEs will act on the one random access response which will be incorrect for one of the UEs. Alternatively, for another example, an eNB in the LTE RAN 24 can send only one random access response for which both UEs 22 and 36 would act on the random access response.
More specifically, Figure 11 shows in more detail how the MSG2 66 is both scheduled and sent to the UEs which were depicted in Figure 10. The diagram shows an example which uses the current, conventional method of how to calculate the RA-RNTI when scheduling MSG2 on PDCCH. Initially, MSG2 is scheduled, by the LTE RAN 24, on PDCCH on Cell X 52 for both UEs as shown in step 68. The MSG2 is then sent, by the LTE RAN 24, on PDSCH on Cell X 52 with the preamble N to both UE1 22 and UE2 36 as shown by message 70. It can be seen in the diagram of Figure 11 that the RA-RNTI values for both UEs will be the same in this case. More specifically, in this example, the t id and the fjd, where tjd is the index of the first subframe of the specified PRACH and fjd is the index of the specified PRACH within that subframe for both UE1 22 and UE2 36 are the same and therefore the RA-RNTI values for both UEs will be the same. In Figure 11 , the RA-RNTI values are calculated using conventional methods as described in chapter 5.1.4 of 3GPP TS 36.321 , e.g., equation (1) which is described in more detail later in the specification.
According to an embodiment, as described above, a purpose of the proposed method is to distinguish between UEs performing random access on a PCell and UEs performing random access on one of their SCell(s), by using different encodings of the RA-RNTI value. The RA-RNTI value is used when scheduling the random access response message (MSG2). By using different encodings of the RA-RNTI value it is possible to distinguish between UEs that perform random access on their PCell and UEs performing random access on one of their SCells.
According to an exemplary embodiment the calculation of the RA-RNTI value will be extended from the current method as shown below in equation (1):
RNTI= 1 + 1 id + 10*f_id (1)
to the following new method as shown below in equation (2):
RNTI= 1 + tjd + 10*f_id + (60*is_SCell) (2)
where t id is the index of the first subframe of the specified PRACH (0≤ t_id <10), fjd is the index of the specified PRACH within that subframe, in ascending order of frequency domain (0≤ f_id < 6) and is_SCell is equal to 0 when performing RA on a PCell and equal to 1 when performing RA on an SCell.
It should be apparent to those skilled in the art that based on equation (2), random accesses performed on a PCell and performed on an SCell will never get the same RA-RNTI and hence will never collide. The reason is that the value range of the RA-RNTI will be 1..60, in case of random access on a PCell, and the value range of the RA-RNTI will be 61..120, in case of random access on an SCell for this embodiment.
Alternatively, the RA-RNTI value could be calculated as shown below in equation (3):
RNTI= 1 + t_id + 10*f_id + (60*is_PCell) (3)
where tjd is the index of the first subframe of the specified PRACH (0≤ t_id <10), f_id is the index of the specified PRACH within that subframe, in ascending order of frequency domain (0≤ fjd < 6) and is_PCell is equal to 1 when performing RA on a PCell and equal to 0 when performing RA on an SCell.
More generally, and according to another embodiment, the same general method is used as in the embodiment above, but the calculation of the RA-RNTI when performing random access on an SCell is done in any other way that makes the value different from a value used when performing random access on a PCell. That is, any method that produces an RA-RNTI value for an SCell access which is non-overlapping with the range used for a PCell access, e.g., 1 .. 60, is considered in this embodiment.
According to an exemplary embodiment, these "new" RA-RNTI values can be an extension of currently RA-RNTI values. This can be done by extending the RA-RNTI size by a bit, with the extra bit having a flag which indicates if the RA was performed on a PCell or an SCell.
Figure 12 illustrates in more detail how the MSG2 is both scheduled and sent to the UEs, allowing for successful random access for both UEs, which were depicted in Figure 10 according to an embodiment. The diagram shows the method of how to calculate the RA-RNTI described in the first embodiment used when scheduling MSG2 on PDCCH. While Figure 12 appears similar to Figure 11 , there are differences in how the RA-RNTI is determined which allows for the successful random access for both UEs. Initially, MSG2 is scheduled, by the LTE RAN 24, on PDCCH on Cell X 52 for both UEs as shown in step 72. The MSG2 is then sent, by the LTE RAN 24, on PDSCH on Cell X 52 with the preamble N to both UE1 22 and UE2 36 as shown by message 74. It can be seen in the diagram of Figure 12 that the RA-RNTI values for both UEs will be different in this case. More specifically, in this example which uses equation (2) described above, the t id and the fjd for both UE1 22 and UE2 36 are the same but the is_SCell parameter is different with UE1 22 setting the parameter to 0 and UE2 36 setting the parameter to 1. Thus the RA-RNTI values for both UEs will be different. With this proposed method it is possible to reuse the preambles between cells without causing preamble collision between different cells when there are UEs in the system that need to perform random access on both their PCell and any of their SCells. Since preambles can be reused between cells, there is less likely to be a shortage of preambles, and therefore the network can support more parallel random access procedures than what would have been possible using conventional methods.
The method steps performed by the UE can be performed by functional elements of the processing circuitry. In some embodiments these functions are carried out by appropriately programmed microprocessors or microcontrollers, alone or in conjunction with other digital hardware, which may include digital signal processors (DSPs), special-purpose digital logic, and the like. Either or both of the microprocessors and digital hardware (generally illustrated as a "processor" 78 in Figure 13) may be configured to execute program code stored in memory. Since the various details and engineering tradeoffs associated with the design of baseband processing circuitry for mobile devices and wireless base stations are well known and are unnecessary to a full understanding of the invention, additional details are not shown here. The UE 76 will also typically include a transceiver 80, as seen in Figure 13, for transmitting and receiving signals, e.g., random access responses including RNTIs whose values may vary as described above.
Similarly, Figure 13 also depicts the functional elements as related to embodiments described herein for a network node 82, e.g., an E-NodeB or another network node in an LTE system, can include a processor 78 and, potentially, a transceiver 80 and memory circuit (not shown). Using the above-described exemplary embodiments, a method for handling random access in a radio communication system is shown in the flowchart of Figure 14. The method includes: at step 84, transmitting, by a network node, a random access response including a Radio Network Temporary Identifier (RNTI) which has a first value if the random access is associated with a first cell or a second value if the random access is associated with a second cell, wherein the first value is different than the second value and the first cell is different from the second cell.
Using the above-described exemplary embodiments, another method for performing random access in a radio communication system is shown in the flowchart of Figure 15. The method includes: at step 86, receiving, by a transceiver in a user equipment (UE), a random access response including a Radio Network Temporary Identifier (RNTI) which has a first value if the random access is associated with a first cell or a second value if the random access is associated with a second cell, wherein the first value is different than the second value and the first cell is different from the second cell.
According to an embodiment, a method for random access in a radio communication system comprising: transmitting, by a network node, a random access response including a Radio Network Temporary Identifier (RNTI) which has a first value if the random access is associated with a primary cell (PCell) and a second value if the random access is associated with a secondary cell (SCell), the first value being different than the second value. The first or second value can be generated by the network node in any desired manner, e.g., using one of the equations described below in the detailed description.
The above-described network node method can be implemented in a network node having a transceiver which is configured to perform the method. According to another embodiment, a method for random access in a radio communication system comprises: receiving, by a user equipment (UE), a random access response including a Radio Network Temporary Identifier (RNTI) which has a first value if the random access is associated with a primary cell (PCell) and a second value if the random access is associated with a secondary cell (SCell), the first value being different than the second value.
The above-described UE method can be implemented in a UE having a transceiver which is configured to perform the method.
Program code stored in the memory circuit may comprise one or several types of memory such as read-only memory (ROM), random-access memory, cache memory, flash memory devices, optical storage devices, etc., and includes program instructions for executing one or more telecommunications and/or data communications protocols, as well as instructions for carrying out one or more of the techniques described herein, in several embodiments. Of course, it will be appreciated that not all of the steps of these techniques are necessarily performed in a single microprocessor or even in a single module.
The present invention may, of course, be carried out in other ways than those specifically set forth herein without departing from essential characteristics of the invention. The present embodiments are to be considered in all respects as illustrative and not restrictive.

Claims

What is Claimed is;
1. A method for handling random access in a radio communication system comprising:
transmitting (84), by a network node (82), a random access response including a Radio Network Temporary Identifier (RNTI) which has a first value if the random access is associated with a first cell or a second value if the random access is associated with a second cell, wherein the first value is different than the second value and the first cell is different from the second cell.
2. The method of claim 1 , further comprising:
generating, by the network node, the first value or the second value, wherein the first value or the second value are generated such that the first value is from a first range of values and the second value is from a second range of values where the first range of values and the second range of values are non-overlapping.
3. The method of claims 1-2, wherein the first range of values is from 1-60 inclusive.
4. The method of claims 1-3, wherein the second range of values is from 61-120 inclusive.
5. The method of claims 1-2, wherein the first value or the second value is generated from the equation RNTI=1 +t_id+10*f_id+(60*is_SCell), where tjd is an index of a first subframe of a specified Physical Random Access Control Channel (PRACH) such that 0<t_id<10, fjd is an index of the specified PRACH within that subframe in ascending order of frequency domain such that
0≤f_id<6, and is_SCell is equal to zero when performing random access on the first cell or one when performing random access on a second cell.
6. The method of claims 1-2, wherein the first value or the second value is generated from the equation RNTI=1 +t_id+10*f_id+(60*is_PCell), where t_id is an index of a first subframe of a specified Physical Random Access Control Channel (PRACH) such that 0≤t_id<10, f_id is an index of the specified PRACH within that subframe in ascending order of frequency domain such that 0≤f_id<6, and is_PCell is equal to one when performing random access on the first cell or zero when performing random access on the second cell.
7. The method of claims 1-6, wherein the first value or the second value is transmitted in a random access response.
8. The method of claims 1-7, wherein the network node is an evolved Node B (eNB).
9. The method of claims 1-8, wherein the first cell is a primary cell (PCell) and the second cell is a secondary cell (SCell).
10. A network node (82) capable of handling random access in a radio communication system comprising:
a processor (78) configured to generate a random access response including a Radio Network Temporary Identifier (RNTI) which has a first value if the random access is associated with a first cell or a second value if the random access is associated with a second cell, wherein the first value is different than the second value and the first cell is different from the second cell; and a transceiver (80) configured to transmit the random access response.
11. The network node of claim 10, further comprising:
the network node configured to generate the first value or the second value,
wherein the first value or the second value are generated such that the first value is from a first range of values and the second value is from a second range of values where the first range of values and the second range of values are non-overlapping.
12. The network node of claims 10-11 , wherein the first range of values is from 1-60 inclusive.
13. The network node of claims 10-12, wherein the second range of values is from 61-120 inclusive.
14. The network node of claims 10-11 , wherein the first value or the second value is generated from the equation RNTI=1+t_id+10*f_id+(60*is_SCell), where t id is an index of a first subframe of a specified Physical Random Access
Control Channel (PRACH) such that 0≤t_id<10, f_id is an index of the specified PRACH within that subframe in ascending order of frequency domain such that 0≤f_id<6, and is_SCell is equal to zero when performing random access on the first cell or one when performing random access on the second cell.
15. The network node of claims 10-11 , wherein the first value or the second value is generated from the equation RNTI=1+t_id+10*f_id+(60*is_PCell), where t id is an index of a first subframe of a specified Physical Random Access
Control Channel (PRACH) such that 0<t_id<10, fjd is an index of the specified PRACH within that subframe in ascending order of frequency domain such that 0≤f_id<6, and is_PCell is equal to one when performing random access on the first cell or zero when performing random access on the second cell.
16. The network node of claims 10-15, wherein the first value or the second value is transmitted in a random access response.
17. The network node of claims 10-16, wherein the network node is an evolved Node B (eNB).
18. The network node of claims 10-17, wherein the first cell is a primary cell (PCell) and the second cell is a secondary cell (Scell).
19. A method for performing random access in a radio communication system comprising:
receiving (86), by a transceiver (80) in a user equipment (UE) (76), a random access response including a Radio Network Temporary Identifier (RNTI) which has a first value if the random access is associated with a first cell or a second value if the random access is associated with a second cell, wherein the first value is different than the second value and the first cell is different from the second cell.
20. The method of claim 19, wherein the first value or the second value are generated such that the first value is from a first range of values and the second value is from a second range of values where the first range of values and the second range of values are non-overlapping.
21. The method of claims 19-20, wherein the first range of values is from 1-60 inclusive.
22. The method of claims 19-21 , wherein the second range of values is from 61- 120 inclusive.
23. The method of claims 19-20, wherein the first value or the second value is generated from the equation RNTI=1+t_id+10*f_id+(60*is_SCell), where t_id is an index of a first subframe of a specified Physical Random Access Control Channel (PRACH) such that 0≤t_id<10, fjd is an index of the specified PRACH within that subframe in ascending order of frequency domain such that 0≤f_id<6, and is_SCell is equal to zero when performing random access on the first cell or one when performing random access on the second cell.
24. The method of claims 19-20, wherein the first value or the second value is generated from the equation RNTI=1+tjd+10*f_id+(60*is_PCell), where t_id is an index of a first subframe of a specified Physical Random Access Control Channel (PRACH) such that 0<t_id<10, fjd is an index of the specified PRACH within that subframe in ascending order of frequency domain such that 0≤f_id<6, and is_PCell is equal to one when performing random access on the first cell or zero when performing random access on the second cell.
25. The method of claims 19-24, wherein the first value or the second value is transmitted in a random access response.
26. The method of claims 19-25, wherein the first cell is a primary cell (PCell) and the second cell is a secondary cell (SCell).
27. A user equipment (UE) (76) capable of performing random access in a radio communication system comprising:
a transceiver (80) configured to receive a random access response including a Radio Network Temporary Identifier (RNTI) which has a first value if the random access is associated with a first cell or a second value if the random access is associated with a second cell, wherein the first value is different than the second value and the first cell is different from the second cell.
28. The UE of claim 27, wherein the first value or the second value are generated such that the first value is from a first range of values and the second value is from a second range of values where the first range of values and the second range of values are non-overlapping.
29. The UE of claims 27-28, wherein the first range of values is from 1-60 inclusive.
30. The UE of claims 27-30, wherein the second range of values is from 61-120 inclusive.
31. The UE of claims 27-28, wherein the first value or the second value is generated from the equation RNTI=1 +t_id+10*f_id+(60*is_SCell), where tjd is an index of a first subframe of a specified Physical Random Access Control Channel (PRACH) such that 0<t_id<10, f jd is an index of the specified PRACH within that subframe in ascending order of frequency domain such that 0≤f_id<6, and is_SCell is equal to zero when performing random access on the first cell or one when performing random access on the second cell.
32. The UE of claims 27-28, wherein the first value or the second value is generated from the equation RNTI=1 +t_id+10*f_id+(60*is_PCell), where t_id is an index of a first subframe of a specified Physical Random Access Control Channel (PRACH) such that 0<t_id<10, fjd is an index of the specified PRACH within that subframe in ascending order of frequency domain such that 0≤f_id<6, and is_PCell is equal to one when performing random access on the first cell or zero when performing random access on the second cell.
33. The UE of claims 27-32, wherein the first value or the second value is transmitted in a random access response.
34. The UE of claims 27-33, wherein the first cell is a primary cell (PCell) and the second cell is a secondary cell (SCell).
PCT/SE2012/050610 2012-01-31 2012-06-07 Method and arrangement in a telecommunication system WO2013115691A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP12730054.9A EP2810488B1 (en) 2012-01-31 2012-06-07 Method and arrangement in a telecommunication system
US13/635,557 US9681439B2 (en) 2012-01-31 2012-06-07 Method and arrangement in a telecommunication system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201261592740P 2012-01-31 2012-01-31
US61/592,740 2012-01-31

Publications (1)

Publication Number Publication Date
WO2013115691A1 true WO2013115691A1 (en) 2013-08-08

Family

ID=46384445

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE2012/050610 WO2013115691A1 (en) 2012-01-31 2012-06-07 Method and arrangement in a telecommunication system

Country Status (2)

Country Link
EP (1) EP2810488B1 (en)
WO (1) WO2013115691A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016045715A1 (en) * 2014-09-24 2016-03-31 Nokia Solutions And Networks Oy Repeated transmission of scheduling assignment for random access response
WO2023065249A1 (en) * 2021-10-21 2023-04-27 Nokia Shanghai Bell Co., Ltd. Random access to secondary cell

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
ALCATEL-LUCENT ET AL: "RA procedure on SCell", 3GPP DRAFT; [1] R2-120603 RACH_V1, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Dresden, Germany; 20120206 - 20120210, 30 January 2012 (2012-01-30), XP050565204 *
NOKIA SIEMENS NETWORKS ET AL: "Cross scheduling for RACH on SCell", 3GPP DRAFT; R2-114019 CROSS SCHEDULING FOR RACH ON SCELL, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Athens, Greece; 20110822, 16 August 2011 (2011-08-16), XP050539924 *
NOKIA SIEMENS NETWORKS ET AL: "RA procedure on SCell", 3GPP DRAFT; R2-115804 RA PROCEDURE ON SCELL, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. San Francisco, USA; 20111114 - 20111118, 8 November 2011 (2011-11-08), XP050564312 *
POTEVIO: "Considerations on CBRA on SCell and Msg2 for SCell RA", 3GPP DRAFT; R2-115817 CONSIDERATIONS ON CBRA ON SCELL AND MSG2 FOR SCELL, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. San Francisco, USA; 20111114 - 20111118, 6 November 2011 (2011-11-06), XP050564015 *
SAMSUNG: "Discussions on Msg2 location and monitoring for SCell RA", 3GPP DRAFT; R2-120502-MSG2SCELLRA, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. RAN WG2, no. Dresden, Germany; 20120206 - 20120210, 30 January 2012 (2012-01-30), XP050565222 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016045715A1 (en) * 2014-09-24 2016-03-31 Nokia Solutions And Networks Oy Repeated transmission of scheduling assignment for random access response
RU2672795C2 (en) * 2014-09-24 2018-11-19 Нокиа Солюшнс энд Нетуоркс Ой Repeated transmission of scheduling assignment for random access response
WO2023065249A1 (en) * 2021-10-21 2023-04-27 Nokia Shanghai Bell Co., Ltd. Random access to secondary cell

Also Published As

Publication number Publication date
EP2810488B1 (en) 2018-08-08
EP2810488A1 (en) 2014-12-10

Similar Documents

Publication Publication Date Title
US11895707B2 (en) Method and apparatus for supporting multiple message a sizes and uplink coverage for two step random access procedure
US20200404717A1 (en) Two-Step Contention-Based Random Access Over Radio Resources in LAA
US11503643B2 (en) Random access method and device
EP2745602B1 (en) Controlling random access failure on a secondary cell
US9774983B2 (en) Information processing method and method for UE random accessing LTE system
CN108605338B (en) Communication method using narrow band and MTC device
US20130010711A1 (en) Random Access with Primary and Secondary Component Carrier Communications
US20140079032A1 (en) Uplink Synchronization Method and User Equipment
US9681439B2 (en) Method and arrangement in a telecommunication system
BR112016017767B1 (en) METHOD AND USER EQUIPMENT FOR PERFORMING PREAMBLE TRANSMISSIONS AND METHOD AND NETWORK NODE FOR RECEIVING PREAMBLE TRANSMISSIONS ON A RANDOM ACCESS CHANNEL
EP3780808A1 (en) Terminal device, base station device, and communication method
US11576212B2 (en) Method and apparatus for handling switching between 2-step and 4-step random access
KR20160013912A (en) Communication method and wireless device for supporting variable bandwidth
US9179480B2 (en) Apparatus and method for dynamically selecting a random access response window value for use with random access procedures in a network
US11700639B2 (en) Method and apparatus for releasing PUSCH resources assigned for random access in wireless communication system
US20140080490A1 (en) User equipment, radio base station and methods therein
EP2764742B1 (en) Methods, user equipment and evolved node b for inactivating uplink transmissions
CN111869305A (en) Apparatus and method for performing random access in wireless communication system
EP2810488B1 (en) Method and arrangement in a telecommunication system
US20230103863A1 (en) User equipment and method for transmitting cg pusch

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 13635557

Country of ref document: US

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12730054

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2012730054

Country of ref document: EP